Launchpad has imported 16 comments from the remote bug at https://bugzilla.redhat.com/show_bug.cgi?id=667187.
If you reply to an imported comment from within Launchpad, your comment will be sent to the remote bug automatically. Read more about Launchpad's inter-bugtracker facilities at https://help.launchpad.net/InterBugTracking. ------------------------------------------------------------------------ On 2011-01-04T18:56:33+00:00 nuh wrote: Description of problem: If a NULL UDP packet is sent to the avahi port 5353 it triggers and infinite loop with all the expected goodies, 100% CPU usage and DOS of avahi. This is due to the fix for bug 607297 ( https://bugzilla.redhat.com/show_bug.cgi?id=607297 ). You can re-open that bug and fix it with something that clears the null message from the socket before going to fail or you can keep this as a separate bug. Version-Release number of selected component (if applicable): all versions of avahi >0.6.24 Steps to Reproduce: Send a null UDP packet to avahi on port 5353. I personally use Scapy but anything will work. Actual results: Infinite loop. Expected results: Packet discarded. Additional info: In avahi_recv_dns_packet_ipv4 the bug fix: if (!ms) goto fail; Doesn't clear out a Null message from the socket before returning. This is reason for the infinite loop. Reply at: https://bugs.launchpad.net/ubuntu/+source/avahi/+bug/712844/comments/0 ------------------------------------------------------------------------ On 2011-01-04T19:49:13+00:00 nuh wrote: I have added this bug as a ticket to the avahi tracking system, #325. http://avahi.org/ticket/325 Reply at: https://bugs.launchpad.net/ubuntu/+source/avahi/+bug/712844/comments/1 ------------------------------------------------------------------------ On 2011-02-18T22:52:37+00:00 Lennart wrote: This has been fixed upstream now. Reply at: https://bugs.launchpad.net/ubuntu/+source/avahi/+bug/712844/comments/5 ------------------------------------------------------------------------ On 2011-02-22T18:23:45+00:00 Josh wrote: MITRE is calling CVE-2011-0634 a dupe of CVE-2011-1002. Reply at: https://bugs.launchpad.net/ubuntu/+source/avahi/+bug/712844/comments/6 ------------------------------------------------------------------------ On 2011-02-22T18:49:03+00:00 nuh wrote: CVE-2011-0634 was a candidate for this issue first but never added as an alias for this bug. Someone applied for CVE-2011-1002 recently and added it as an alias for the bug so I added the original CVE-2011-0634. I was going to release a test tool with a full-disc for this bug using CVE-2011-0634 but I wanted it patched first. I apologize for the confusion, in the future I will add the CVE right away. Reply at: https://bugs.launchpad.net/ubuntu/+source/avahi/+bug/712844/comments/7 ------------------------------------------------------------------------ On 2011-02-23T16:44:10+00:00 Jan wrote: Moving this bug to Security Response product, to properly track the issue. Reply at: https://bugs.launchpad.net/ubuntu/+source/avahi/+bug/712844/comments/8 ------------------------------------------------------------------------ On 2011-02-23T16:47:03+00:00 Jan wrote: Common Vulnerabilities and Exposures assigned an identifier CVE-2011-1002 to the following vulnerability: avahi-core/socket.c in avahi-daemon in Avahi before 0.6.29 allows remote attackers to cause a denial of service (infinite loop) via an empty (1) IPv4 or (2) IPv6 UDP packet to port 5353. NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-2244. References: [1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1002 [2] http://openwall.com/lists/oss-security/2011/02/18/1 [3] http://openwall.com/lists/oss-security/2011/02/18/4 [4] http://avahi.org/ticket/325 [5] http://git.0pointer.de/?p=avahi.git;a=commit;h=46109dfec75534fe270c0ab902576f685d5ab3a6 [6] http://www.securityfocus.com/bid/46446 [7] http://secunia.com/advisories/43361 Reply at: https://bugs.launchpad.net/ubuntu/+source/avahi/+bug/712844/comments/9 ------------------------------------------------------------------------ On 2011-02-23T16:48:49+00:00 Jan wrote: As noted above, the CVE-2011-0634 identifier has been rejected with the following explanation: Name: CVE-2011-0634 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0634 [Open URL] Final-Decision: Interim-Decision: Modified: Proposed: Assigned: 20110120 Category: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2011-1002. Reason: This candidate is a reservation duplicate of CVE-2011-1002. Notes: All CVE users should reference CVE-2011-1002 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage. Reply at: https://bugs.launchpad.net/ubuntu/+source/avahi/+bug/712844/comments/10 ------------------------------------------------------------------------ On 2011-02-23T17:48:33+00:00 Jan wrote: This issue affects the versions of the avahi package, as shipped with Red Hat Enterprise Linux 5 and 6. -- This issue affects the versions of the avahi package, as shipped with Fedora release of 13 and 14. Please schedule an update. Reply at: https://bugs.launchpad.net/ubuntu/+source/avahi/+bug/712844/comments/11 ------------------------------------------------------------------------ On 2011-02-23T17:49:29+00:00 Jan wrote: Created avahi tracking bugs for this issue Affects: fedora-all [bug 679861] Reply at: https://bugs.launchpad.net/ubuntu/+source/avahi/+bug/712844/comments/12 ------------------------------------------------------------------------ On 2011-03-04T22:24:37+00:00 Vincent wrote: Because avahi is used for local network broadcast messages (local network service discovery), it should be AV:A, not AV:N. It also is low impact, not moderate impact, as a result. Reply at: https://bugs.launchpad.net/ubuntu/+source/avahi/+bug/712844/comments/13 ------------------------------------------------------------------------ On 2011-03-14T17:29:35+00:00 Tomas wrote: I'm going to keep this at impact=moderate to have a consistent rating with what was used for CVE-2010-2244, even though it's borderline issue. The fix is to be included in the already planned avahi updated in 6.1. Reply at: https://bugs.launchpad.net/ubuntu/+source/avahi/+bug/712844/comments/14 ------------------------------------------------------------------------ On 2011-03-14T17:45:13+00:00 Tomas wrote: Upstream git commit, noted for future reference: http://git.0pointer.de/?p=avahi.git;a=commitdiff;h=46109dfec75534fe270c0ab902576f685d5ab3a6 Reply at: https://bugs.launchpad.net/ubuntu/+source/avahi/+bug/712844/comments/15 ------------------------------------------------------------------------ On 2011-04-12T18:09:33+00:00 errata-xmlrpc wrote: This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2011:0436 https://rhn.redhat.com/errata/RHSA-2011-0436.html Reply at: https://bugs.launchpad.net/ubuntu/+source/avahi/+bug/712844/comments/17 ------------------------------------------------------------------------ On 2011-05-19T11:09:53+00:00 errata-xmlrpc wrote: This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2011:0779 https://rhn.redhat.com/errata/RHSA-2011-0779.html Reply at: https://bugs.launchpad.net/ubuntu/+source/avahi/+bug/712844/comments/18 ------------------------------------------------------------------------ On 2011-05-19T14:28:30+00:00 errata-xmlrpc wrote: This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2011:0779 https://rhn.redhat.com/errata/RHSA-2011-0779.html Reply at: https://bugs.launchpad.net/ubuntu/+source/avahi/+bug/712844/comments/19 ** Changed in: avahi (Fedora) Status: Unknown => Fix Released ** Changed in: avahi (Fedora) Importance: Unknown => Medium ** Bug watch added: Red Hat Bugzilla #607297 https://bugzilla.redhat.com/show_bug.cgi?id=607297 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2011-0634 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2011-1002 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-2244 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/712844 Title: null UDP packet triggers an infinite loop To manage notifications about this bug go to: https://bugs.launchpad.net/avahi/+bug/712844/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs